Search results for: underlay spectrum sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2377

Search results for: underlay spectrum sharing

2227 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 114
2226 The Positive Effects of Top-Sharing: A Case Study

Authors: Maike Andresen, Georg Dochtmann

Abstract:

Due to political, social, and societal changes in labor organization, top-sharing, defined as job-sharing in leading positions, becomes more important in HRM. German companies are looking for practical and economically meaningful solutions that allow to enduringly increase women’s ratio in management, not only because of a recently implemented quota. Furthermore, supporting employees in achieving work-life balance is perceived as an important goal for a sustainable HRM to gain competitive advantage. Top-sharing is seen as being suitable to reach both goals. To evaluate determinants leading to effective top-sharing, a case study of a newly implemented top-sharing tandem in a large German enterprise was conducted over a period of 15 months. In this company, a full leadership position was split into two 60%-part-time positions held by an experienced female leader in her late career and a female college who took over her first leadership position (mid-career). We assumed a person-person fit in terms of a match of the top sharing partners’ personality profiles (Big Five) and their leadership motivations to be important prerequisites for an effective collaboration between them. We evaluated the person-person fit variables once before the tandem started to work. Both leaders were expected to learn from each other (mentoring, competency development). On an operational level, they were supposed to lead together the same employees in an effective manner (leader-member exchange), presupposing an effective cooperation between both (handing over information). To see developments over time, these processes were evaluated three times over the span of the project. Top-Sharing and the underlined processes are expected to positively influence the tandem’s performance which has been evaluated twice, at the beginning and the end of the project, to assess its development over time as well. The evaluation of the personality and the basic motives suggests that both executives can be a successful top-sharing tandem. The competency evaluations (supervisor as well as self-assessment) increased over the time span. Although the top sharing tandem worked on equal terms, they implemented rather classical than peer-mentoring due to different career ambitions of the tandem partners. Thus, opportunities were not used completely. Team-member exchange scores proved the good cooperation between the top-sharers. Although the employees did not evaluate the leader-member-exchange between them and the two leaders of the tandem homogeneously, the top-sharing tandem itself did not have the impression that the employees’ task performance depended on whom of the tandem was responsible for the task. Furthermore, top-sharing did not negatively influence the performance of both leaders. During qualitative interviews with the top-sharers and their team, we found that the top-sharers could focus more easily on their tasks. The results suggest positive outcomes of top-sharing (e.g. competency improvement, learning from each other through mentoring). Top-Sharing does not hamper performance. Thus, further research and practical implementations are suggested. As part-time jobs are still more often a female solution to increase their work-life- and work-family-balance, top-sharing may be a suitable solution to increase the woman’s ratio in leadership positions as well as to sustainable increase work-life-balance of executives.

Keywords: mentoring, part-time leadership, top-sharing, work-life-balance

Procedia PDF Downloads 239
2225 Lossless Secret Image Sharing Based on Integer Discrete Cosine Transform

Authors: Li Li, Ahmed A. Abd El-Latif, Aya El-Fatyany, Mohamed Amin

Abstract:

This paper proposes a new secret image sharing method based on integer discrete cosine transform (IntDCT). It first transforms the original image into the frequency domain (DCT coefficients) using IntDCT, which are operated on each block with size 8*8. Then, it generates shares among each DCT coefficients in the same place of each block, that is, all the DC components are used to generate DC shares, the ith AC component in each block are utilized to generate ith AC shares, and so on. The DC and AC shares components with the same number are combined together to generate DCT shadows. Experimental results and analyses show that the proposed method can recover the original image lossless than those methods based on traditional DCT and is more sensitive to tiny change in both the coefficients and the content of the image.

Keywords: secret image sharing, integer DCT, lossless recovery, sensitivity

Procedia PDF Downloads 373
2224 Cyber-Social Networks in Preventing Terrorism: Topological Scope

Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito

Abstract:

It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.

Keywords: complex network platform, counterterrorism, information sharing topology, social bots

Procedia PDF Downloads 135
2223 Lies and Pretended Fairness of Police Officers in Sharing

Authors: Eitan Elaad

Abstract:

The current study aimed to examine lying and pretended fairness by police personnel in sharing situations. Forty Israeli police officers and 40 laypeople from the community, all males, self-assessed their lie-telling ability, rated the frequency of their lies, evaluated the acceptability of lying, and indicated using rational and intuitive thinking while lying. Next, according to the ultimatum game procedure, participants were asked to share 100 points with an imagined target, either a male policeman or a male non-policeman. Participants allocated points to the target person bearing in mind that the other person must accept or reject their offer. Participants' goal was to retain as many points as possible, and to this end, they could tell the target person that fewer than 100 points were available for distribution. We defined concealment or lying as the difference between the available 100 points and the sum of points designated for sharing. Results indicated that police officers lied less to their fellow police targets than non-police targets, whereas laypeople lied less to non-police targets than imagined police targets. The ratio between the points offered to the imagined target person and the points endowed by the participant as available for sharing defined pretended fairness.Enhanced pretended fairness indicates higher motivation to display fair sharing even if the fair sharing is fictitious. Police officers presented higher pretended fairness to police targets than laypeople, whereas laypeople set off more fairness to non-police targets than police officers. We discussed the results concerning occupation solidarity and loyalty among police personnel. Specifically, police work involves uncertainty, danger and risk, coercive authority, and the use of force, which isolates the police from the community and dictates strong bonds of solidarity between police personnel. No wonder police officers shared more points (lied less) to fellow police targets than non-police targets. On the other hand, police legitimacy or the belief that the police are acting honestly in the best interest of the citizens constitutes citizens' attitudes toward the police. The relatively low number of points shared for distribution by laypeople to police targets indicates difficulties with the legitimacy of the Israeli police.

Keywords: lying, fairness, police solidarity, police legitimacy, sharing, ultimatum game

Procedia PDF Downloads 96
2222 Institutionalizing Peace in Iraqi Kurdistan Post-civil War, 1998 to Present

Authors: Hawre Hasan Hama, Choman Mahmood H. Rashid

Abstract:

The four-year armed conflict between the Kurdistan Democratic Party (KDP) and the Patriotic Union of Kurdistan (PUK) ended in September 1998 under the terms of the Washington Agreement. Since then, there has been a quarter-century of durable peace between the two combatant parties, though they have often been at odds politically. Based on interviews with Kurdish political leaders from both parties, this paper argues that sharing or dividing power across all four dimensions of state power — political, military, territorial, and economic — has played a vital role ensuring the durability of the peace settlement. The paper traces the KDP-PUK power sharing system through three stages: the transition stage (1998-2006), the “golden” period (2006-2013), the “weakening” period (2013 to present).

Keywords: peace settlement, enduring peace, power-sharing and power dividing, Iraqi Kurdistan.

Procedia PDF Downloads 55
2221 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks

Authors: Anusha M., V. Srikanth

Abstract:

Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.

Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios

Procedia PDF Downloads 523
2220 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 376
2219 The Influence of Transformational Leadership on Knowledge Sharing in Iraq’s Public and Private Higher Education: A Comparison Study

Authors: Sawsan J. Al-Husseini

Abstract:

Transformational leadership (TL) has been found to have an important influence on knowledge and knowledge management (KM). It can contribute to organizational learning, employees’ creativity, encourage followers to participate in educational programs and develop the skills needed to achieve exceptional performance. This research sought to examine the impact of TL on knowledge donating and collecting and the differences between these impacts in public and private higher education institutes (HEIs) in Iraq. A mixed method approach was taken and 580 valid responses were collected to test the causal relationships between the factors, then 12 interviews were conducted with the leaders of HEIs to give more insight of the findings from quantitative stage. Employing structural equation modelling with AMOS v.24, the research found that TL would be ideal in an educational context, promoting knowledge sharing activities in both sectors. The interviews revealed differences between public and private HEIs in terms of the effects relationships. Guidelines are developed for academics as well as leaders and provided evidence to support the use of TL to encourage knowledge sharing activities within higher education in developing countries particularly Iraq.

Keywords: transformational leadership, knowledge sharing, higher education, multi-group

Procedia PDF Downloads 135
2218 Sharing Tourism Experience through Social Media: Consumer's Behavioral Intention for Destination Choice

Authors: Mohammad Tipu Sultan, Farzana Sharmin, Ke Xue

Abstract:

Social media create a better opportunity for travelers to search for travel information, select destination and share their personal experiences of the travel. This study proposes a framework which describes the relationships between social media, and positive or negative tourism experience sharing impact on destination choice. To find out new trends of travelers behavioral intention, we propose an extended theoretical model, the Theory of Reasoned Action (TRA). We conducted a survey to analyze three external factors, subjective norms, and positive and negative experience influence on travel destination choice. Structural questionnaire analysis was employed to confirm the proposed research hypothesis within the relationship between consumer influences on the shared experience of social media. The results of the study confirm that sharing positive experiences influence the positive effect of destination choice, while negative experiences decrease the destination selection option. The results indicate that attitudes, subjective norms are passively influenced by shared experience. Moreover, we find that sharing live pictures of travel experiences through social media helps to reduce negative perceptions of the destination brand. This research contribution is useable to the research field as a new determination factor and the findings could be used by destination organization management (DMO) to enhancing their tourism promotion through social media.

Keywords: destination choice, tourism experience sharing, Theory of Reasoned Action, TRA, social media

Procedia PDF Downloads 123
2217 Controlled Shock Response Spectrum Test on Spacecraft Subsystem Using Electrodynamic Shaker

Authors: M. Madheswaran, A. R. Prashant, S. Ramakrishna, V. Ramesh Naidu, P. Govindan, P. Aravindakshan

Abstract:

Shock Response spectrum (SRS) tests are one of the tests that are conducted on some critical systems of spacecraft as part of environmental testing. The SRS tests are conducted to simulate the pyro shocks that occur during launch phases as well as during deployment of spacecraft appendages. Some of the methods to carryout SRS tests are pyro technique method, impact hammer method, drop shock method and using electro dynamic shakers. The pyro technique, impact hammer and drop shock methods are open loop tests, whereas SRS testing using electrodynamic shaker is a controlled closed loop test. SRS testing using electrodynamic shaker offers various advantages such as simple test set up, better controllability and repeatability. However, it is important to devise a a proper test methodology so that safety of the electro dynamic shaker and that of test specimen are not compromised. This paper discusses the challenges that are involved in conducting SRS tests, shaker validation and the necessary precautions to be considered. Approach involved in choosing various test parameters like synthesis waveform, spectrum convergence level, etc., are discussed. A case study of SRS test conducted on an optical payload of Indian Geo stationary spacecraft is presented.

Keywords: maxi-max spectrum, SRS (shock response spectrum), SDOf (single degree of freedom), wavelet synthesis

Procedia PDF Downloads 328
2216 Effect of Early Therapeutic Intervention for the Children With Autism Spectrum Disorders: A Quasi Experimental Design

Authors: Sultana Razia

Abstract:

The purpose of this study was to investigate the effect of early therapeutic intervention for the children with autism spectrum disorder. Participants were 63 children with autism spectrum disorder from Autism Corner in a selected rehabilitation center of Bangladesh. The hypothesis of the study was that participants would demonstrate significant improvement in social skills, speech and sensory skills following a 3-month intensive therapeutic protocol. This study included children who are at age of 18-month to 36-month and who were taking occupational therapy and speech and language therapy from the autism center. They were primarily screened using M-CHAT; however, children with other physical disability or medical conditions excluded. 3-months interventions of 6 sessions per week are a minimum of 45-minutes long per session, one to one interaction followed by parent-led structured home-based therapy was provided. The results indicated that early intensive therapeutic intervention improve understanding, social skills and sensory skills. It can be concluded that therapeutic early intervention a positive effect on Autism Spectrum Disorder.

Keywords: M-CHAT, ASD, sensory cheeklist, OT

Procedia PDF Downloads 20
2215 Multichannel Scheme under Fairness Environment for Cognitive Radio Networks

Authors: Hans Marquez Ramos, Cesar Hernandez, Ingrid Páez

Abstract:

This paper develops a multiple channel assignment model, which allows to take advantage in most efficient way, spectrum opportunities in cognitive radio networks. Developed scheme allows make several available and frequency adjacent channel assignments, which require a bigger wide band, under an equality environment. The hybrid assignment model it is made by to algorithms, one who makes the ranking and select available frequency channels and the other one in charge of establishing an equality criteria, in order to not restrict spectrum opportunities for all other secondary users who wish to make transmissions. Measurements made were done for average bandwidth, average delay, as well fairness computation for several channel assignment. Reached results were evaluated with experimental spectrum occupational data from GSM frequency band captured. Developed model, shows evidence of improvement in spectrum opportunity use and a wider average transmit bandwidth for each secondary user, maintaining equality criteria in channel assignment.

Keywords: bandwidth, fairness, multichannel, secondary users

Procedia PDF Downloads 467
2214 Predictive Analytics of Bike Sharing Rider Parameters

Authors: Bongs Lainjo

Abstract:

The evolution and escalation of bike-sharing programs (BSP) continue unabated. Since the sixties, many countries have introduced different models and strategies of BSP. These include variations ranging from dockless models to electronic real-time monitoring systems. Reasons for using this BSP include recreation, errands, work, etc. And there is all indication that complex, and more innovative rider-friendly systems are yet to be introduced. The objective of this paper is to analyze current variables established by different operators and streamline them identifying the most compelling ones using analytics. Given the contents of available databases, there is a lack of uniformity and common standard on what is required and what is not. Two factors appear to be common: user type (registered and unregistered, and duration of each trip). This article uses historical data provided by one operator based in the greater Washington, District of Columbia, USA area. Several variables including categorical and continuous data types were screened. Eight out of 18 were considered acceptable and significantly contribute to determining a useful and reliable predictive model. Bike-sharing systems have become popular in recent years all around the world. Although this trend has resulted in many studies on public cycling systems, there have been few previous studies on the factors influencing public bicycle travel behavior. A bike-sharing system is a computer-controlled system in which individuals can borrow bikes for a fee or free for a limited period. This study has identified unprecedented useful, and pragmatic parameters required in improving BSP ridership dynamics.

Keywords: sharing program, historical data, parameters, ridership dynamics, trip duration

Procedia PDF Downloads 109
2213 Inversely Designed Chipless Radio Frequency Identification (RFID) Tags Using Deep Learning

Authors: Madhawa Basnayaka, Jouni Paltakari

Abstract:

Fully passive backscattering chipless RFID tags are an emerging wireless technology with low cost, higher reading distance, and fast automatic identification without human interference, unlike already available technologies like optical barcodes. The design optimization of chipless RFID tags is crucial as it requires replacing integrated chips found in conventional RFID tags with printed geometric designs. These designs enable data encoding and decoding through backscattered electromagnetic (EM) signatures. The applications of chipless RFID tags have been limited due to the constraints of data encoding capacity and the ability to design accurate yet efficient configurations. The traditional approach to accomplishing design parameters for a desired EM response involves iterative adjustment of design parameters and simulating until the desired EM spectrum is achieved. However, traditional numerical simulation methods encounter limitations in optimizing design parameters efficiently due to the speed and resource consumption. In this work, a deep learning neural network (DNN) is utilized to establish a correlation between the EM spectrum and the dimensional parameters of nested centric rings, specifically square and octagonal. The proposed bi-directional DNN has two simultaneously running neural networks, namely spectrum prediction and design parameters prediction. First, spectrum prediction DNN was trained to minimize mean square error (MSE). After the training process was completed, the spectrum prediction DNN was able to accurately predict the EM spectrum according to the input design parameters within a few seconds. Then, the trained spectrum prediction DNN was connected to the design parameters prediction DNN and trained two networks simultaneously. For the first time in chipless tag design, design parameters were predicted accurately after training bi-directional DNN for a desired EM spectrum. The model was evaluated using a randomly generated spectrum and the tag was manufactured using the predicted geometrical parameters. The manufactured tags were successfully tested in the laboratory. The amount of iterative computer simulations has been significantly decreased by this approach. Therefore, highly efficient but ultrafast bi-directional DNN models allow rapid and complicated chipless RFID tag designs.

Keywords: artificial intelligence, chipless RFID, deep learning, machine learning

Procedia PDF Downloads 14
2212 Amorphous Silicon-Based PINIP Structure for Human-Like Photosensor

Authors: Sheng-Chuan Hsu

Abstract:

Because the existing structure of ambient light sensor is most silicon photodiode device, it is extremely sensitive in the red and infrared regions. Even though the IR-Cut filter had added, it still cannot completely eliminate the influence of infrared light, and the spectral response of infrared light was stronger than that of the human eyes. Therefore, it is not able to present the vision spectrum of the human eye reacts with the ambient light. Then it needs to consider that the human eye feels the spectra that show significant differences between light and dark place. Consequently, in practical applications, we must create and develop advanced device of human-like photosensor which can solve these problems of ambient light sensor and let cognitive lighting system to provide suitable light to achieve the goals of vision spectrum of human eye and save energy.

Keywords: ambient light sensor, vision spectrum, cognitive lighting system, human eye

Procedia PDF Downloads 309
2211 Application of Envelope Spectrum Analysis and Spectral Kurtosis to Diagnose Debris Fault in Bearing Using Acoustic Signals

Authors: Henry Ogbemudia Omoregbee, Mabel Usunobun Olanipekun

Abstract:

Debris fault diagnosis based on acoustic signals in rolling element bearing running at low speed and high radial loads are more of low amplitudes, particularly in the case of debris faults whose signals necessitate high sensitivity analyses. As the rollers in the bearing roll over debris trapped in grease used to lubricate the bearings, the envelope signal created by amplitude demodulation carries additional diagnostic information that is not available through ordinary spectrum analysis of the raw signal. The kurtosis value obtained for three different scenarios (debris induced, outer crack induced, and a normal good bearing) couldn't be used to easily identify whether the used bearings were defective or not. It was established in this work that the envelope spectrum analysis detected the fault signature and its harmonics induced in the debris bearings when bandpass filtering of the raw signal with the frequency band specified by kurtogram and spectral kurtosis was made.

Keywords: rolling bearings, rolling element bearing noise, bandpass filtering, harmonics, envelope spectrum analysis, spectral kurtosis

Procedia PDF Downloads 47
2210 Intergenerational Succession within Family Businesses: The Role of Sharing and Creation Knowledge

Authors: Wissal Ben Arfi, Jean-Michel Sahut

Abstract:

The purpose of this paper is to provide a deeper understanding of the succession process from a knowledge management perspective. By doing that, succession process in family businesses, as an environment for creating and sharing knowledge, was explored. Design/Methodology/Approach: To support our reasoning, we collected qualitative data through 16 in-depth interviews conducted with all decision makers involved in the family businesses succession process in France. These open-ended responses were subsequently exposed to thematic discourse analysis. Findings: Central to this exhibit is the nature and magnitude of knowledge creation and sharing among the actors within the family succession context and how can tacit knowledge sharing facilitate the succession process. We also identified factors that inhibit down the knowledge creation and sharing processes. The sharing and creation of knowledge among members of a family business appear to be a complex process that must be part of a strategy for change. This implies that it requests trust and takes a certain amount of time because it requires organizational change and a clear and coherent strategic vision that is accepted and assimilated by all the members. Professional and leadership skills are of particular importance in knowledge sharing and creation processes. In most cases, tacit knowledge is crucial when it is shared and accumulated collectively. Our findings reveal that managers should find ways of implementing knowledge sharing and creation processes while acknowledging the succession process within family firms. This study highlights the importance of generating knowledge strategies in order to enhance the performance and the success of intergenerational succession. The empirical outcomes contribute to enrich the field of succession management process and enhance the role of knowledge in shaping family performance and longevity. To a large extent, the lessons learned from the study of succession processes in family-owned businesses are that when there is a deliberate effort to introduce a knowledge-based approach, this action becomes a seminal event in the life of the organization. Originality/Value: The paper contributes to the deep understanding of interactions among actors by examining the knowledge creation and sharing processes since current researches in family succession focused on aspects such as personal development of potential, intra-family succession intention, decision-making processes in family businesses. Besides, as succession is one of the key factors that determine the longevity and the performance of family businesses, it also contributes to literature by examining how tacit knowledge is transferred, shared and created in family businesses and how this can facilitate the intergenerational succession process.

Keywords: family-owned businesses, succession process, knowledge, performance

Procedia PDF Downloads 177
2209 Multi Criteria Authentication Method in Cognitive Radio Networks

Authors: Shokoufeh Monjezi Kouchak

Abstract:

Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.

Keywords: authentication, cognitive radio, security, radio networks

Procedia PDF Downloads 345
2208 The Use of Robots for Children and Young People on the Autism Spectrum: A Systematic Review

Authors: Athanasia Kouroupa

Abstract:

Existing research highlights the effect of employing robots in sessions with children and young people on the autism spectrum to develop and practice skills important to independent and functional living. The systematic review aimed to explore the way robots has been used with children and young people on the autism spectrum and the effect of using robots as a therapeutic interface. An electronic bibliographic database search using a combination of expressions was conducted. Data were extracted in relation to robot types, session characteristics, and outcomes and analysed using narrative synthesis. Forty studies were selected in the review. Humanoid robots were predominantly used to practice a range of social and communication skills. On average, children and young people on the autism spectrum had five sessions, twice a week, for approximately half an hour. Having sessions with a robot was commonly equal to or more effective than 'traditional' interventions delivered by a human therapist or having no therapy. The review reported encouraging outcomes to practice and develop a range of skills with children and young people on the autism spectrum. These findings suggest that some form of intervention is favourable over no intervention. However, there is little evidence for the relative effectiveness of the robot-based intervention as an innovative alternative option. Many of the studies had methodological weaknesses that make them vulnerable to bias. There is a need for further research that adheres to strict scientific methods making direct comparisons between different treatment options.

Keywords: autism, children, robots, outcomes

Procedia PDF Downloads 101
2207 Role of Environmental Risk Factors in Autism Spectrum Disorder

Authors: Dost Muhammad Halepoto, Laila AL-Ayadhi

Abstract:

Neurodevelopmental disorders such as autism can cause lifelong disability. Genetic and environmental factors are believed to contribute to the development of autism spectrum disorder (ASD), but relatively few studies have considered potential environmental risks. Several industrial chemicals and other environmental exposures are recognized causes of neurodevelopmental disorders and subclinical brain dysfunction. The toxic effects of such chemicals in the developing human brain are not known. This review highlights the role of environmental risk factors including drugs, toxic chemicals, heavy metals, pesticides, vaccines, and other suspected neurotoxicants including persistent organic pollutants for ASD. It also provides information about the environmental toxins to yield new insights into factors that affect autism risk as well as an opportunity to investigate the relation between autism and environmental exposure.

Keywords: Autism Spectrum Disorder, ASD, environmental factors, neurodevelopmental disorder

Procedia PDF Downloads 369
2206 Research on Supply Chain Coordination Based on Lateral Transshipment in the Background of New Retail

Authors: Yue Meng, Lingyun Wei

Abstract:

In this paper, the coordination problem of a supply chain system composed of multiple retailers and manufacturers is studied under the background of the new retail supply chain. Taking a system composed of two retailers and one manufacturer as an example, this paper introduces an online store owned by the manufacturer to reflect the characteristics of the combination of online and offline new retail. Then, this paper gives the conditions that need to be satisfied to realize the coordination between retailers and manufacturers, such as the revenue sharing coefficient. The supply chain coordination model is compared with the newsboy model through a specific example. Finally, the conclusion is drawn that the profits of the coordinated supply chain and its members are better than the corresponding profits under the newsboy model; that is, the coordination of the supply chain is realized by using the revenue sharing contract and the transshipment fund mechanism.

Keywords: transshipment, coordination, multi-retailer, revenue-sharing contract

Procedia PDF Downloads 108
2205 Colour Recognition Pen Technology in Dental Technique and Dental Laboratories

Authors: M. Dabirinezhad, M. Bayat Pour, A. Dabirinejad

Abstract:

Recognition of the color spectrum of the teeth plays a significant role in the dental laboratories to produce dentures. Since there are various types and colours of teeth for each patient, there is a need to specify the exact and the most suitable colour to produce a denture. Usually, dentists utilize pallets to identify the color that suits a patient based on the color of the adjacent teeth. Consistent with this, there can be human errors by dentists to recognize the optimum colour for the patient, and it can be annoying for the patient. According to the statistics, there are some claims from the patients that they are not satisfied by the colour of their dentures after the installation of the denture in their mouths. This problem emanates from the lack of sufficient accuracy during the colour recognition process of denture production. The colour recognition pen (CRP) is a technology to distinguish the colour spectrum of the intended teeth with the highest accuracy. CRP is equipped with a sensor that is capable to read and analyse a wide range of spectrums. It is also connected to a database that contains all the spectrum ranges, which exist in the market. The database is editable and updatable based on market requirements. Another advantage of this invention can be mentioned as saving time for the patients since there is no need to redo the denture production in case of failure on the first try.

Keywords: colour recognition pen, colour spectrum, dental laboratory, denture

Procedia PDF Downloads 169
2204 Study on Science and Technology Resources Coordinated Development and Innovation of Beijing-Tianjin-Hebei Region

Authors: Hong Zhang, Runlian Miao, Min Zhang

Abstract:

Coordinated development of Beijing-Tianjin-Hebei region is of great importance and has been emphasized by the government in recent years. Beijing-Tianjin-Hebei region accumulates a large part of S&T resources of the whole country and boasts the most influential achievements. In order to improve innovation capability of the region, universities, research institutions and enterprises from Beijing, Tianjin and Hebei have cooperated in many forms, but technological innovation is not so satisfactory due to unbalanced allocation, poor sharing and low utilization efficiency of S&T resources. Therefore, it’s very necessary to promote resources sharing, optimize their overall layout, and enhance their innovation performance, which can further deepen coordination development of the region. This study focuses on S&T resources with the methods of documents research plus field investigation and qualitative research combing plus quantitive research. It starts from the macro background of promoting coordinated development of Beijing-Tianjin-Hebei region and arrives at improving regional innovation capability. Firstly, the author makes a literature review on coordinated development of Beijing-Tianjin-Hebei region and summarizes that coordinated development has been carried forward in the major fields which lay foundation for regional innovation; secondly, analyzes current S&T resources distribution and coordinated innovation by taking key industries as the examples; based on analysis of the status quo of resources sharing and innovation in the region, the author points out problems and obstacles that holdbacks coordinated innovation of the region and at last raises some suggestions to resources sharing and regional innovation. It reaches the conclusion that an efficient management mechanism, market laws, favorable environment, model innovation and incentive measures can help to accelerate resources sharing and regional innovation in the region.

Keywords: Beijing-Tianjin-Hebei region, coordinated development, innovation, S&T resources

Procedia PDF Downloads 272
2203 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 126
2202 The Effects of Signal Level of the Microwave Generator on the Brillouin Gain Spectrum in BOTDA and BOTDR

Authors: Murat Yucel, Murat Yucel, Nail Ferhat Ozturk, Halim Haldun Goktas, Cemal Gemci, Fatih Vehbi Celebi

Abstract:

In this study, Brillouin gain spectrum (BGS) is experimentally analyzed in the Brillouin optical time domain reflectometry (BOTDR) and Brillouin optical time domain analyzer (BOTDA). For this purpose, the signal level of the microwave generator is varied and the effects of BGS are investigated. In the setups, 20 km conventional single mode fiber is used to both setups and laser wavelengths are selected around 1550 nm. To achieve best results, it can be used between 5 dBm to 15 dBm signal level of microwave generator for BOTDA and BOTDR setups.

Keywords: microwave signal level, Brillouin gain spectrum, BOTDA, BOTDR

Procedia PDF Downloads 657
2201 Relationship and Comorbidity Between Down Syndrome and Autism Spectrum Disorder

Authors: Javiera Espinosa, Patricia López, Noelia Santos, Nadia Loro, Esther Moraleda

Abstract:

In recent years, there has been a notable increase in the number of investigations that establish that Down Syndrome and Autism Spectrum Disorder are diagnoses that can coexist together. However, there are also many studies that consider that both diagnoses present neuropsychological, linguistic and adaptive characteristics with a totally different profile. The objective of this research is to question whether there really can be a profile that encompasses both disorders or if they can be incompatible with each other. To this end, a review of the scientific literature of recent years has been carried out. The results indicate that the two lines collect opposite approaches. On the one hand, there is research that supports the increase in comorbidity between Down Syndrome and Autism Spectrum Disorder, and on the other hand, many investigations show a totally different general development profile between the two. The discussion focuses on discussing both lines of work and on proposing future lines of research in this regard.

Keywords: disability, language, speech, down syndrome

Procedia PDF Downloads 45
2200 Radio Regulation Development and Radio Spectrum Analysis of Earth Station in Motion Service

Authors: Fei Peng, Jun Yuan, Chen Fan, Fan Jiang, Qian Sun, Yudi Liu

Abstract:

Although Earth Station in Motion (ESIM) services are widely used and there is a huge market demand around the world, International Telecommunication Union (ITU) does not have unified conclusion for the use of ESIM yet. ESIM are Mobile Satellite Services (MSS) due to its mobile-based attributes, while multiple administrations want to use ESIM in Fixed Satellite Service (FSS). However, Radio Regulations (RR) have strict distinction between MSS and FSS. In this case, ITU has been very controversial because this kind of application will violate the RR Article and the conflict will bring risks to the global deployment. Thus, this paper illustrates the development of rules, regulations, standards concerning ESIM and the radio spectrum usage of ESIM in different regions around the world. Firstly, the basic rules, standard and definition of ITU’s Radiocommunication Sector (ITU-R) is introduced. Secondly, the World Radiocommunication Conference (WRC) agenda item on radio spectrum allocation for ESIM, e.g. in C/Ku/Ka band, is introduced and multi-view on the radio spectrum allocation is elaborated, especially on 19.7-20.2 GHz & 29.5-30.0 GHz. Then, some ITU-R Recommendations and Reports are analyzed on the specific technique to enable these ESIM to communicate with Geostationary Earth Orbit Satellite (GSO) space stations in the FSS without causing interference at levels in excess of that caused by conventional FSS earth stations. Meanwhile, the opposite opinion on not allocating EISM service in FSS frequency band is also elaborated. Finally, based on the ESIM’s future application, the ITU-R standards development trend is forecasted. In conclusion, using radio spectrum resource in an equitable, rational and efficient manner is the basic guideline of ITU. Although it is not a good approach to obstruct the revise of RR when there is a large demand for radio spectrum resource in satellite industry, still the propulsion and global demand of the whole industry may face difficulties on the unclear application in modify rules of RR.

Keywords: earth station in motion, ITU standards, radio regulations, radio spectrum, satellite communication

Procedia PDF Downloads 260
2199 Interoperable Design Coordination Method for Sharing Communication Information Using Building Information Model Collaboration Format

Authors: Jin Gang Lee, Hyun-Soo Lee, Moonseo Park

Abstract:

The utilization of BIM and IFC allows project participants to collaborate across different areas by consistently sharing interoperable product information represented in a model. Comments or markups generated during the coordination process can be categorized as communication information, which can be shared in less standardized manner. It can be difficult to manage and reuse such information compared to the product information in a model. The present study proposes an interoperable coordination method using BCF (the BIM Collaboration Format) for managing and sharing the communication information during BIM based coordination process. A management function for coordination in the BIM collaboration system is developed to assess its ability to share the communication information in BIM collaboration projects. This approach systematically links communication information during the coordination process to the building model and serves as a type of storage system for retrieving knowledge created during BIM collaboration projects.

Keywords: design coordination, building information model, BIM collaboration format, industry foundation classes

Procedia PDF Downloads 393
2198 Knowledge-Based Virtual Community System (KBVCS) for Enhancing Knowledge Sharing in Mechatronics System Diagnostic and Repair: A Case of Automobile

Authors: Adedeji W. Oyediran, Yekini N. Asafe

Abstract:

Mechatronics is synergistic integration of mechanical engineering, with electronics and intelligent computer control in the design and manufacturing of industrial products and processes. Automobile (auto car, motor car or car is a wheeled motor vehicle used for transporting passengers, which also carries its own engine or motor) is a mechatronic system which served as major means of transportation around the world. Virtually all community has a need for automobile. This makes automobile issues as related to diagnostic and repair interesting to all communities. Consequent to the diversification of skill in diagnosing automobile faults and approaches in solving some problems and innovation in automobile industry. It is appropriate to say that repair and diagnostic of automobile will be better enhanced if community has opportunity of sharing knowledge and idea globally. This paper discussed the desirable elements in automobile as mechatronics system and present conceptual framework of virtual community model for automobile users.

Keywords: automobile, automobile users, knowledge sharing, mechatronics system, virtual community

Procedia PDF Downloads 479